[BACK]Return to errata28.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata28.html between version 1.65 and 1.66

version 1.65, 2014/03/31 04:11:40 version 1.66, 2014/03/31 16:02:48
Line 77 
Line 77 
   
 <ul>  <ul>
 <li><a name="uucp"></a>  <li><a name="uucp"></a>
 <font color="#009000"><strong>033: SECURITY FIX: September 11, 2001</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>033: SECURITY FIX: September 11, 2001</strong></font>
   &nbsp; <i>All architectures</i><br>
 A security hole exists in <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=uuxqt&amp;sektion=8">uuxqt(8)</a>  A security hole exists in <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=uuxqt&amp;sektion=8">uuxqt(8)</a>
 that may allow an attacker to run arbitrary commands as user uucp and  that may allow an attacker to run arbitrary commands as user uucp and
 use this to gain root access.  use this to gain root access.
Line 90 
Line 91 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="lpd"></a>  <li><a name="lpd"></a>
 <font color="#009000"><strong>032: SECURITY FIX: August 29, 2001</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>032: SECURITY FIX: August 29, 2001</strong></font>
   &nbsp; <i>All architectures</i><br>
 A security hole exists in <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=lpd&amp;sektion=8">lpd(8)</a>  A security hole exists in <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=lpd&amp;sektion=8">lpd(8)</a>
 that may allow an attacker with line printer access to gain root  that may allow an attacker with line printer access to gain root
 privileges.  A machine must be running lpd to be vulnerable (OpenBSD  privileges.  A machine must be running lpd to be vulnerable (OpenBSD
Line 102 
Line 104 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="sendmail2"></a>  <li><a name="sendmail2"></a>
 <font color="#009000"><strong>031: SECURITY FIX: August 21, 2001</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>031: SECURITY FIX: August 21, 2001</strong></font>
   &nbsp; <i>All architectures</i><br>
 A security hole exists in <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sendmail&amp;sektion=8">sendmail(8)</a>  A security hole exists in <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sendmail&amp;sektion=8">sendmail(8)</a>
 that may allow an attacker on the local host to gain root privileges by  that may allow an attacker on the local host to gain root privileges by
 specifying out-of-bounds debug parameters.  specifying out-of-bounds debug parameters.
Line 111 
Line 114 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="kernexec"></a>  <li><a name="kernexec"></a>
 <font color="#009000"><strong>030: SECURITY FIX: June 15, 2001</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>030: SECURITY FIX: June 15, 2001</strong></font>
   &nbsp; <i>All architectures</i><br>
 A race condition exists in the kernel <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=execve&amp;sektion=2&amp;format=html">execve(2)</a> implementation that opens a small window of vulnerability for a non-privileged user to <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ptrace&amp;sektion=2&amp;format=html">ptrace(2)</a> attach to a suid/sgid process.  A race condition exists in the kernel <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=execve&amp;sektion=2&amp;format=html">execve(2)</a> implementation that opens a small window of vulnerability for a non-privileged user to <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=ptrace&amp;sektion=2&amp;format=html">ptrace(2)</a> attach to a suid/sgid process.
 <br>  <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/030_kernexec.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/030_kernexec.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="fts"></a>  <li><a name="fts"></a>
 <font color="#009000"><strong>029: SECURITY FIX: May 30, 2001</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>029: SECURITY FIX: May 30, 2001</strong></font>
   &nbsp; <i>All architectures</i><br>
 Programs using the <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=fts&amp;sektion=3&amp;format=html">fts(3)</a>  Programs using the <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=fts&amp;sektion=3&amp;format=html">fts(3)</a>
 routines (such as rm, find, and most programs that take a <b>-R</b>  routines (such as rm, find, and most programs that take a <b>-R</b>
 flag) can be tricked into changing into the wrong directory if the  flag) can be tricked into changing into the wrong directory if the
Line 130 
Line 135 
 This is the second version of the patch.  This is the second version of the patch.
 <p>  <p>
 <li><a name="sendmail"></a>  <li><a name="sendmail"></a>
 <font color="#009000"><strong>028: SECURITY FIX: May 29, 2001</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>028: SECURITY FIX: May 29, 2001</strong></font>
   &nbsp; <i>All architectures</i><br>
 The signal handlers in <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sen  The signal handlers in <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sen
 dmail&amp;sektion=8&amp;format=html">sendmail(8)</a> contain code that is unsafe in the  dmail&amp;sektion=8&amp;format=html">sendmail(8)</a> contain code that is unsafe in the
 context of a signal handler.  This leads to potentially serious  context of a signal handler.  This leads to potentially serious
Line 141 
Line 147 
 It updates sendmail to version 8.11.4.  It updates sendmail to version 8.11.4.
 <p>  <p>
 <li><a name="ipf_frag"></a>  <li><a name="ipf_frag"></a>
 <font color="#009000"><strong>027: SECURITY FIX: Apr 23, 2001</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>027: SECURITY FIX: Apr 23, 2001</strong></font>
   &nbsp; <i>All architectures</i><br>
 IPF has a serious problem with fragment caching, the bug is triggered if you use the ipf(5) syntax &quot;keep state&quot;.<br>  IPF has a serious problem with fragment caching, the bug is triggered if you use the ipf(5) syntax &quot;keep state&quot;.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/027_ipf-frag.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/027_ipf-frag.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="glob_limit"></a>  <li><a name="glob_limit"></a>
 <font color="#009000"><strong>026: SECURITY FIX: Apr 23, 2001</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>026: SECURITY FIX: Apr 23, 2001</strong></font>
   &nbsp; <i>All architectures</i><br>
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=glob&amp;sektion=3">ftpd(8)</a> has a potential DoS related to <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=glob&amp;sektion=3">glob(3)</a>. This patch introduces a GLOB_LIMIT, eliminating the DoS. You must have <a href="#glob">025_glob.patch</a> installed before installing this patch.<br>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=glob&amp;sektion=3">ftpd(8)</a> has a potential DoS related to <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=glob&amp;sektion=3">glob(3)</a>. This patch introduces a GLOB_LIMIT, eliminating the DoS. You must have <a href="#glob">025_glob.patch</a> installed before installing this patch.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/026_globlimit.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/026_globlimit.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="glob"></a>  <li><a name="glob"></a>
 <font color="#009000"><strong>025: SECURITY FIX: Apr 10, 2001</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>025: SECURITY FIX: Apr 10, 2001</strong></font>
   &nbsp; <i>All architectures</i><br>
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=glob&amp;sektion=3">glob(3)</a> contains multiple buffer overflows. <br>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=glob&amp;sektion=3">glob(3)</a> contains multiple buffer overflows. <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/025_glob.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/025_glob.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="readline"></a>  <li><a name="readline"></a>
 <font color="#009000"><strong>024: SECURITY FIX: Mar 18, 2001</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>024: SECURITY FIX: Mar 18, 2001</strong></font>
   &nbsp; <i>All architectures</i><br>
 The readline library shipped with OpenBSD allows history files creation  The readline library shipped with OpenBSD allows history files creation
 with a permissive  with a permissive
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=umask&amp;sektion=2">umask(2)</a>.  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=umask&amp;sektion=2">umask(2)</a>.
Line 170 
Line 180 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="ipsec_ah"></a>  <li><a name="ipsec_ah"></a>
 <font color="#009000"><strong>023: SECURITY FIX: Mar 2, 2001</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>023: SECURITY FIX: Mar 2, 2001</strong></font>
   &nbsp; <i>All architectures</i><br>
 Insufficient checks in the IPSEC AH IPv4 option handling code can lead to a buffer overrun leading to a remote DoS. This option is not on by default.<br>  Insufficient checks in the IPSEC AH IPv4 option handling code can lead to a buffer overrun leading to a remote DoS. This option is not on by default.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/023_ip_ah.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/023_ip_ah.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
Line 182 
Line 193 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="sudo"></a>  <li><a name="sudo"></a>
 <font color="#009000"><strong>021: SECURITY FIX: Feb 22, 2001</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>021: SECURITY FIX: Feb 22, 2001</strong></font>
   &nbsp; <i>All architectures</i><br>
 There is an exploitable heap corruption bug in  There is an exploitable heap corruption bug in
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sudo&amp;sektion=8">sudo</a>.  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sudo&amp;sektion=8">sudo</a>.
 <br>  <br>
Line 190 
Line 202 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="libwrap"></a>  <li><a name="libwrap"></a>
 <font color="#009000"><strong>020: IMPLEMENTATION FIX: Feb 15, 2001</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>020: IMPLEMENTATION FIX: Feb 15, 2001</strong></font>
   &nbsp; <i>All architectures</i><br>
 Client side ident protocol was broken in libwrap, affecting anything using libwrap including <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=tcpd&amp;sektion=8">tcpd</a>. The effect of this was that libwrap would never retrieve and log ident values from remote hosts on connections.<br>  Client side ident protocol was broken in libwrap, affecting anything using libwrap including <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=tcpd&amp;sektion=8">tcpd</a>. The effect of this was that libwrap would never retrieve and log ident values from remote hosts on connections.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/020_libwrap.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/020_libwrap.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="lepci"></a>  <li><a name="lepci"></a>
 <font color="#009000"><strong>019: IMPLEMENTATION FIX: Jan 31, 2001</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>019: IMPLEMENTATION FIX: Jan 31, 2001</strong></font>
   &nbsp; <i>All architectures</i><br>
 Fix memory allocation in the PCI LANCE driver, <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=le&amp;sektion=4&amp;arch=i386">le</a>.  A side effect of this is that OpenBSD under VMWare now works again.<br>  Fix memory allocation in the PCI LANCE driver, <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=le&amp;sektion=4&amp;arch=i386">le</a>.  A side effect of this is that OpenBSD under VMWare now works again.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/019_lepci.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/019_lepci.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="named"></a>  <li><a name="named"></a>
 <font color="#009000"><strong>018: SECURITY FIX: Jan 29, 2001</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>018: SECURITY FIX: Jan 29, 2001</strong></font>
   &nbsp; <i>All architectures</i><br>
 Merge <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=named&amp;sektion=8">named</a>  Merge <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=named&amp;sektion=8">named</a>
 with ISC BIND 4.9.8-REL, which fixes some buffer vulnerabilities (actually it appears  with ISC BIND 4.9.8-REL, which fixes some buffer vulnerabilities (actually it appears
 that these were already impossible to exploit beforehand).<br>  that these were already impossible to exploit beforehand).<br>
Line 210 
Line 225 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="rnd"></a>  <li><a name="rnd"></a>
 <font color="#009000"><strong>017: SECURITY FIX: Jan 22, 2001</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>017: SECURITY FIX: Jan 22, 2001</strong></font>
   &nbsp; <i>All architectures</i><br>
 The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=random&amp;sektion=4">rnd(4)</a> device does not use all of its input when data is written to it.<br>  The <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=random&amp;sektion=4">rnd(4)</a> device does not use all of its input when data is written to it.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/017_rnd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/017_rnd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="tl"></a>  <li><a name="tl"></a>
 <font color="#009000"><strong>016: RELIABILITY FIX: Jan 4, 2001</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>016: RELIABILITY FIX: Jan 4, 2001</strong></font>
   &nbsp; <i>All architectures</i><br>
 Allow ThunderLAN cards to share interrupts nicely.<br>  Allow ThunderLAN cards to share interrupts nicely.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/016_tl.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/016_tl.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
Line 228 
Line 245 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="xlock"></a>  <li><a name="xlock"></a>
 <font color="#009000"><strong>014: SECURITY FIX: Dec 22, 2000</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>014: SECURITY FIX: Dec 22, 2000</strong></font>
   &nbsp; <i>All architectures</i><br>
 Improve xlock(1)'s authentication by authenticating via a pipe in an early forked process. No known vulnerability exists, this is just a precautionary patch.<br>  Improve xlock(1)'s authentication by authenticating via a pipe in an early forked process. No known vulnerability exists, this is just a precautionary patch.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/014_xlock.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/014_xlock.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
Line 247 
Line 265 
 </ul>  </ul>
 <p>  <p>
 <li><a name="procfs"></a>  <li><a name="procfs"></a>
 <font color="#009000"><strong>013: SECURITY FIX: Dec 18, 2000</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>013: SECURITY FIX: Dec 18, 2000</strong></font>
   &nbsp; <i>All architectures</i><br>
 <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=mount_procfs&amp;sektion=8">Procfs</a> contained numerous overflows, which could lead an intruder to root permissions. Procfs is NOT enabled by default in OpenBSD. <br>  <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=mount_procfs&amp;sektion=8">Procfs</a> contained numerous overflows, which could lead an intruder to root permissions. Procfs is NOT enabled by default in OpenBSD. <br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/013_procfs.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/013_procfs.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
Line 260 
Line 279 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="hwcrypto"></a>  <li><a name="hwcrypto"></a>
 <font color="#009000"><strong>011: RELIABILITY FIX: Dec 13, 2000</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>011: RELIABILITY FIX: Dec 13, 2000</strong></font>
   &nbsp; <i>All architectures</i><br>
 The crypto subsystem could incorrectly fail to run certain software ciphers,  The crypto subsystem could incorrectly fail to run certain software ciphers,
 if a hardware card existed in the machine.<br>  if a hardware card existed in the machine.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/011_hwcrypto.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/011_hwcrypto.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="fastroute"></a>  <li><a name="fastroute"></a>
 <font color="#009000"><strong>010: RELIABILITY FIX: Dec 11, 2000</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>010: RELIABILITY FIX: Dec 11, 2000</strong></font>
   &nbsp; <i>All architectures</i><br>
 A crash could occur during fast routing, if IPSEC was enabled.<br>  A crash could occur during fast routing, if IPSEC was enabled.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/010_fastroute.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/010_fastroute.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="kerberos2"></a>  <li><a name="kerberos2"></a>
 <font color="#009000"><strong>009: SECURITY FIX: Dec 10, 2000</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>009: SECURITY FIX: Dec 10, 2000</strong></font>
   &nbsp; <i>All architectures</i><br>
 Another problem exists in the Kerberos libraries.<br>  Another problem exists in the Kerberos libraries.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/009_kerberos2.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/009_kerberos2.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="kerberos"></a>  <li><a name="kerberos"></a>
 <font color="#009000"><strong>008: SECURITY FIX: Dec 7, 2000</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>008: SECURITY FIX: Dec 7, 2000</strong></font>
   &nbsp; <i>All architectures</i><br>
 Two problems have recently been discovered in the KerberosIV code.<p>  Two problems have recently been discovered in the KerberosIV code.<p>
 1. A symlink problem was discovered in the KerberosIV password checking  1. A symlink problem was discovered in the KerberosIV password checking
 routines /usr/bin/su and /usr/bin/login, which makes it possible for a  routines /usr/bin/su and /usr/bin/login, which makes it possible for a
Line 324 
Line 347 
     </ul>      </ul>
 <p>  <p>
 <li><a name="ftpd"></a>  <li><a name="ftpd"></a>
 <font color="#009000"><strong>005: SECURITY FIX: Dec 4, 2000</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>005: SECURITY FIX: Dec 4, 2000</strong></font>
   &nbsp; <i>All architectures</i><br>
 OpenBSD 2.8's ftpd contains a one-byte overflow in the replydirname() function.<br>  OpenBSD 2.8's ftpd contains a one-byte overflow in the replydirname() function.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/005_ftpd.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/005_ftpd.patch">
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 You can view the <a href="advisories/ftpd_replydirname.txt">OpenBSD Advisory</a> here.  You can view the <a href="advisories/ftpd_replydirname.txt">OpenBSD Advisory</a> here.
 <p>  <p>
 <li><a name="rijndael"></a>  <li><a name="rijndael"></a>
 <font color="#009000"><strong>004: RELIABILITY FIX: Nov 17, 2000</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>004: RELIABILITY FIX: Nov 17, 2000</strong></font>
   &nbsp; <i>All architectures</i><br>
 First off, AES (Rijndael) encryption and decryption were broken for IPsec  First off, AES (Rijndael) encryption and decryption were broken for IPsec
 and swap encryption.<br>  and swap encryption.<br>
 Secondly, the AES code did not work properly on big endian machines.<br>  Secondly, the AES code did not work properly on big endian machines.<br>
Line 346 
Line 371 
 A source code patch exists which remedies this problem.</a>  A source code patch exists which remedies this problem.</a>
 <p>  <p>
 <li><a name="skey"></a>  <li><a name="skey"></a>
 <font color="#009000"><strong>002: IMPLEMENTATION FIX: Nov 10, 2000</strong></font> &nbsp; <i>All architectures</i><br>  <font color="#009000"><strong>002: IMPLEMENTATION FIX: Nov 10, 2000</strong></font>
   &nbsp; <i>All architectures</i><br>
 In ssh(1), skey support for SSH1 protocol was broken.  Some people might consider  In ssh(1), skey support for SSH1 protocol was broken.  Some people might consider
 that kind of important.<br>  that kind of important.<br>
 <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/002_sshskey.patch">  <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/002_sshskey.patch">

Legend:
Removed from v.1.65  
changed lines
  Added in v.1.66